| Crates.io | sigstore |
| lib.rs | sigstore |
| version | 0.12.1 |
| created_at | 2021-08-19 23:40:25.797761+00 |
| updated_at | 2025-05-28 13:21:11.755278+00 |
| description | An experimental crate to interact with sigstore |
| homepage | |
| repository | https://github.com/sigstore/sigstore-rs |
| max_upload_size | |
| id | 439792 |
| size | 896,974 |
| Continuous integration | Docs | License | Crate version | Crate downloads |
|---|---|---|---|---|
A crate to interact with sigstore.
This crate is under active development and will not be considered stable until the 1.0 release.
The crate implements the following verification mechanisms:
Signature annotations and certificate email can be provided at verification time.
For use with Fulcio ephemeral key signing, an OpenID connect API is available, along with a fulcio client implementation.
All rekor client APIs can be leveraged to interact with the transparency log.
Cryptographic key management with the following key interfaces:
The examples directory contains demo programs using the library.
Each example can be executed with the cargo run --example <name> command.
For example, openidconnect can be run with the following command:
cargo run --example openidconnect
To embedded this crate in WASM modules, build it using the wasm cargo feature:
cargo build --no-default-features --features wasm --target wasm32-unknown-unknown
NOTE: The wasm32-wasi target architecture is not yet supported.
Contributions are welcome! Please see the contributing guidelines for more information.
Should you discover any security issues, please refer to sigstores security process